The Cumulative Cyber Deterrence

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Conference on Cyber Warfare and Security (17. : 2022 : Albany, NY; Online) 17th International Conference on Cyber Warfare and Security (ICCWS 2021)
1. Verfasser: Turunen, Maija (VerfasserIn)
Weitere Verfasser: Kari, Martti J. (VerfasserIn)
Pages:17
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
An Ontology for Effective Security Incident Management 2022 Chockalingam, Sabarathinam
Protecting Networks with Intelligent Diodes 2022 Dahlstrom, Jason
Zero Trust Container Architecture (ZTCA): A Framework for Applying Zero Trust Principals to Docker Containers 2022 Leahy, Darragh
Future Needs of the Cybersecurity Workforce 2022 Justice, Connie
Taxonomy of Social Engineering Attacks: A Survey of Trends and Future Directions 2022 Maraj, Arianit
Context-Aware Cyber Threat Intelligence Exchange Platform 2022 Motlhabi, Michael
Blockchain Technology for Addressing Privacy and Security Issues in Cloud Computing 2022 Tehrani, Pardis Moslemzadeh
The Development of Cybersecurity Awareness Measurement Model in the Water Sector 2022 Mufor, Bryan S.
A Modern ICT Network Simulator for Co-Simulations in Smart Grid Applications 2022 Niehaus, Fabian
Transient Execution and Side Channel Analysis: A Vulnerability or a Science Experiment? 2022 Shepherd, Michael
What is a Substantial Contribution to a Research Project in Offensive Cyberspace Operations that Merits Co-Authorship? 2022 Huskaj, Gazmend
An Exploration on APTs in Biocybersecurity and Cyberbiosecurity 2022 Palmer, Xavier-Lewis
Ensuring the Security of Space Systems from Eavesdropping Attacks 2022 Richardson, Caleb
Critical Systems Protection (CSP): The US Secret Service’s Tactical Cyber Capability for Securing Protectees 2022 Hyman, Austin
Cyberbullying Indicator as a Precurson to a Cyber Construct Development 2022 Al-Romaihi, Salam Khalifa
Education and Training Against Threat of Phishing Emails 2022 Burita, Ladislav
Design and Evaluation of a Cyber Protection Team Planner Work Aid 2022 Liggett, Kristen
On Explainable Al Solutions for Targeting in Cyber Military Operations 2022 Maathuis, Clara
I Know You by Heart: Biometric Authentication based on Electrocardiogram (ECG) signals 2022 Lipps, Christoph
Specialised Media Monitoring Tool to Observe Situational Awareness 2022 Pieterse, Heloise
Alle Artikel auflisten